Translator
Easton Library 
515 Church Street
Easton, PA 18042 
610-258-2917  
 
 
Mobile Printing
Palmer Branch 
1 Weller Place  
Easton, PA 18045  
610-258-7492  
     
 
HOME MY ACCOUNT CATALOG LOCAL HISTORY ROOM YOUTH SERVICES TEEN SERVICES PALMER BRANCH CONTACT US
Search Our Website     Computer and Laptop Policy Use
Library Use Policy
Patron Rights and Responsibilities
Children's Use Policies
Security Camera Policy
Library Resources and Programming Policies
Computer and Laptop
Policy Use
Youth Services Computer Use Policy
Social Media Policy
Proctoring
Mobile Printing
Copier and Fax Services
 
Computer and laptop resources at the Library shall be used only to access different types of information for the primary purposes of education, research, and lifelong learning. These resources are made available to all citizens within the Library's service area and, secondarily, to those outside the Library's service area.
 
Requirements:
For those residing within the Library's service area, a current and valid library card is required to use the computers and laptops. Patrons must use their own cards to access library computers. Those outside the Library's service area with a valid Pennsylvania or New Jersey driver's license or other form of photo ID can obtain a three-month computer use only card. Those outside the Library's service area beyond Pennsylvania or New Jersey can obtain a guest pass with a valid driver's license or other form of photo ID.
 
Within the Library:
In compliance with the CIPA Act, internet stations are filtered as per 47 U.S.C. 254 (h) and (l). Use of library computers and laptops must follow the guidelines of all networks accessed. In addition to resource access, the Library provides office applications, research applications, and educational software. Patrons MAY NOT download or run software not installed by the Library.
 
Inappropriate Use
Computers and laptops MAY NOT be used to conduct any illegal activities including, but not limited to:
  • Accessing explicit sexual content as defined in 19 PA C.S. 5903
  • Gambling
  • Fraud
  • Copyright violations, including Bit Torrent and other peer-to-peer downloading sites
  • To perpetuate fraud or identity theft
Such activities will be subject to prosecution by local, state, and federal authorities. Library privileges may be suspended or revoked for violation of this policy.
 
The Library offers free wifi within its buildings. Wifi users are bound by the policy outlined here.
 
The following are the property of their proprietor and/or subsidiaries, affiliates, assigns, licensors, or other respective owners and are protected without limitation, pursuant to U.S. and foreign copyright and trademark laws, and cannot be reproduced for commercial use of any kind including, but not limited to the following:
  • Software
  • Design
  • Text
  • Images
  • Photographs
  • Illustrations
  • Audio clips
  • Video clips
  • Artwork
  • Graphic material
  • Other copyrightable elements and the selection and arrangement thereof
  • Trademarks, service marks, and trade names
The internet and its resources may contain material which is controversial, incomplete, or inaccurate. The Library is not responsible for material accessed via its computers, laptops, or wifi and cannot censor access to, nor protect patrons from, offensive content. Parents/guardians of minors assume responsibility for their children's use of the internet through the Library's connection.
 
Library computers and laptops are regularly maintained to ensure reliable operation. The Library is not responsible for any losses due to computer operation, viruses, or other equipment failure.
 
While every attempt is made to keep all information passing to and from our systems private, patrons must assume that any information transmitted or received is not private. The Library does not monitor normal usage of our systems but will fully cooperate with legal authorities in the investigation of illegal activities, including turning over usage logs and records upon receipt of proper warrants or subpoenas. For additional information regarding privacy and confidentiality, please see the Electronic Communications Act of 1986, the Telecommunications Act of 1998, and the U.S.A. Patriot Act (PL 107-56).